Metro Media Entertainment, LLC v. Does 1 - 47
Filing
67
MEMORANDUM OPINION. Signed by Chief Judge Deborah K. Chasanow on 12/14/12. (sat, Chambers)
IN THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF MARYLAND
:
METRO MEDIA ENTERTAINMENT, LLC
:
v.
:
Civil Action No. DKC 12-0347
:
RICHARD STEINRUCK
:
MEMORANDUM OPINION
Presently
copyright
pending
and
infringement
ready
action
for
are
resolution
motions
to
in
this
dismiss
counterclaim and for sanctions filed by Plaintiff Metro Media
Entertainment, LLC.
(ECF No. 29).
The issues are fully briefed
and the court now rules pursuant to Local Rule 105.6, no hearing
being deemed necessary.
For the reasons that follow, the motion
to dismiss will be granted and the motion for sanctions will be
denied.
I.
Background
Plaintiff Metro Media Entertainment, LLC, commenced this
action on February 6, 2012, by filing a complaint against fortyseven
Doe
defendants
alleged
to
have
infringed
Plaintiff’s
copyright in a pornographic film by downloading and/or uploading
the video over the Internet via a file-sharing protocol known as
BitTorrent.
As set forth in a spate of recent opinions in this
court and others across the country, this technology functions
as follows:
BitTorrent facilitates the sharing of large
amounts
of
data
across
“Peer-to-Peer”
networks on the [I]nternet.
To begin, an
initial user decides to share a file (known
as a “seed”) with a torrent network. Other
users (known as “peers”) within the network
then
connect
to
the
seed
file
for
downloading.
Each peer downloads one piece
of the seed file at a time.
As a piece of
the seed file is downloaded, it is typically
made available to other peers to download.
In other words, every downloader is also an
uploader.
Thus, as the process continues,
peers may receive pieces of the seed file
from those who have already downloaded that
piece and not necessarily from the initial
seeder.
This system of multiple pieces of
data coming from various peers is called a
“swarm.”
With respect to any particular
swarm, an alphanumeric representation (known
as a “hash”) of the shared file remains the
same.
A hash is essentially a “forensic
digital
fingerprint”
that
identifies
a
particular copy of a shared file.
Third Degree Films, Inc. v. Does 1-108, No. DKC 11-3007, 2012 WL
1514807, at *1 (D.Md. Apr. 27, 2012) (internal footnotes and
citations omitted).
Through this process, each of the “peers” participating in
a given “swarm” exposes his or her Internet Protocol address
(“IP address”) to the outside world.
The owners of copyrights
in films such as My Baby Got Back! #44 – the subject of the
instant
case
–
retain
the
services
of
law
firms
or
investigators, such as the Copyright Enforcement Group, LLC –
2
the firm retained by the instant plaintiff – to monitor and
record the information revealed by the infringers.
Typically, a
lawsuit is then filed against all swarm participants believed to
be located within the jurisdiction of a given court, along with
a request for early discovery in which the plaintiff seeks to
serve
subpoenas
on
Internet
Service
Providers
(“ISPs”)
associated with the alleged infringers in order to learn the
identity of subscribers.1
Once this information is obtained, an
offer of settlement invariably follows in which the plaintiff
advises the subscriber of the infringing IP address that he or
she may avoid the specter of having his or her name publicly
associated with the unauthorized downloading of pornography by
promptly
remitting
a
substantial
payment
to
counsel
for
the
plaintiff.
1
A number of courts have recognized a distinction between
the subscribers of the IP addresses associated with the
infringing activity and the infringers themselves.
See, e.g.,
Discount Video Center, Inc. v. Does 1-29, --- F.R.D. ----, 2012
WL 3308997, at *3 (D.Mass 2012) (“While ultimately the Plaintiff
may determine that a meaningful number of the subscribers are
also the infringing Defendants, the Plaintiff does not now know
that to be the case, as to any individual subscriber, nor will
it know that simply as a result of having received the names and
addresses of the subscribers.”).
These courts have found that
obtaining the name of a subscriber from an ISP is merely “the
first step in the Plaintiff’s effort to determine the identity
of the infringer,” id. at *5, and have required additional
evidence before an amended complaint providing the names of
alleged infringers may be filed. Others, including this court,
have permitted the plaintiff to name the subscribers as
defendants, subject to ultimate proof that the subscribers are,
in fact, the infringers.
3
Recognizing the practical difficulties presented by joining
so many defendants in a single lawsuit, as well as “the risk of
extortionate settlement, especially when joinder is being used
to that end,” Third Degree Films, 2012 WL 1514807, at *4 (citing
SBO
Pictures,
Inc.
6002620,
at
*4
district
have
v.
Does
(N.D.Cal.
severed
1-3036,
Nov.
the
No.
30,
11-4220
2011)),
defendants
in
SC,
courts
these
dismissed without prejudice all except Doe 1.
2011
in
WL
this
cases
and
Moreover, with
respect to the remaining defendants, this court directed that
future filings containing identifying information be made under
seal.
Thus, in theory, the risk of extortionate settlement was
substantially
have
abated,
otherwise
embarrassment
felt
or
as
the
remaining
compelled
reputational
to
defendants,
settle
harm,
were
in
order
free
to
who
might
to
avoid
appear
to
defend the suits without having to reveal their identities, at
least initially.
So it was, in the instant case, that the court issued a sua
sponte order on May 7, 2012, severing the forty-seven defendants
named in the complaint and dismissing all except Doe 1, further
directing that “all documents filed in this action that contain
Doe
1’s
identifying
(ECF No. 17, at 2).
information
shall
be
filed
under
seal.”
Days later, Plaintiff’s counsel transmitted
a settlement offer to the sole remaining defendant, advising, in
part:
4
Discovery was authorized by the United
States federal district court in the aboveidentified case relating to the identities
of the subscribers whose [I]nternet accounts
were allegedly used to download from and/or
make available on the Internet unauthorized
copies of [My Baby Got Back! #44] in
violation of the U.S. Copyright Act (17
U.S.C. §§ 101 et seq.
You were identified
as one of those subscribers.
(ECF
No.
23-3).
After
observing
that
17
U.S.C.
§
504(c)
authorizes statutory damages of up to $150,000 for a willful
violation,
Plaintiff’s
counsel
stated,
“[o]n
behalf
of
Plaintiff, we will formally name you as a defendant (i.e., as an
alleged infringer of Plaintiff’s copyright in [My Baby Got Back!
#44]),” unless a proposed “settlement offer” of $3,500.00 was
promptly remitted.
Doe
(Id.).
1,
by
counsel,
counterclaim
in
which
responded
he
publicly
Defendant Richard Steinruck.
by
filing
revealed
(ECF No. 23).
an
his
answer
and
identity
as
After emphatically
denying any involvement with the downloading or uploading of
Plaintiff’s
Plaintiff
film,
is
Defendant
taking
alleges
advantage
of
in
“an
his
counterclaim
opportunity
to
that
reap
undeserved and illegal rewards and to convert [its] copyrighted
materials into a cash generating resource . . . by extorting
money from those who have done no illegal act, but who cannot
risk
the
downloading
opprobrium
of
pornography.”
being
falsely
(Id.
5
at
¶
accused
37).
of
illegally
According
to
Defendant, “[t]he key allegations [contained in the complaint
and request for early discovery] used to convince the [c]ourt to
authorize the issuance of the subpoena [to Defendant’s ISP] were
false and Plaintiff misled the [c]ourt in order to further its
scheme.”
(Id. at ¶ 41).
Defendant characterizes Plaintiff’s
subsequent settlement offer as an “extortive shakedown letter,”
which
“effectively
threatened
that
unless
Mr.
Steinruck
paid
Plaintiff the money demanded . . . [Plaintiff] would make public
the identity of John Doe 1 – Mr. Steinruck – as a downloader,
copier,
and
[c]omplaint.”
distributor
(Id.
at
of
¶
pornography
45).
In
by
litigating
Defendant’s
view,
the
these
“actions . . . constitute[] abuse of process under Maryland
state law, as well as abuse of process under federal law[,] . .
. [and] may also constitute contempt of this [c]ourt, for using
[] [c]ourt process to attempt to accomplish an illegal purpose.”
(Id. at ¶ 48 (internal citation omitted)).2
2
While the counterclaim purports to raise a claim of abuse
of process under federal common law, the parties cite no
authority for the proposition that such a cause of action is
even cognizable.
Indeed, it appears that it is not.
See
A.H.D.C. v. City of Fresno, No. CIV-F-97-5498 OWW, 2004 WL
5866234, at *13 (E.D.Cal. Oct. 1, 2004) (“there is no federal
common law abuse of process” (quoting Adena, Inc. v. Cohn, No.
00-3041, 2001 U.S. Dist. LEXIS 19186 (E.D.Pa. Nov. 26, 2001);
Wheeldin v. Wheeler, 373 U.S. 647, 652 (1963)). It is unclear,
moreover, whether Defendant intended to raise a counterclaim for
civil contempt, but the equivocal assertion that unspecified
conduct “may also constitute contempt” is insufficient to state
a plausible claim.
Thus, the court construes Defendant’s
6
In light of Defendant’s self-disclosure, the court issued
an order directing “[a]ny interested party . . . to show cause
by August 8, 2012, why Doe 1’s identifying information should
remain sealed or redacted from public view.”
response,
Mr.
Steinruck
“acknowledge[d]
(ECF No. 24).
that
by
In
filing
his
Answer and Counterclaim disclosing his identity he has waived
confidentiality
and
sealing
of
any
documents
in
counterclaim
this
by
case.”
(ECF No. 27).
Plaintiff
responded
to
the
filing
the
pending motion to dismiss, pursuant to Fed.R.Civ.P. 12(b)(6),
and
seeking
complaint,
sanctions
pursuant
related
to
28
to
the
U.S.C.
§
filing
1927.
of
a
frivolous
(ECF
No.
29).
Defendant has opposed both motions (ECF No. 31), and Plaintiff
has filed papers in reply (ECF No. 32).
II.
Motion to Dismiss
A.
A
Standard of Review
motion
pursuant
to
Federal
Rule
of
Civil
12(b)(6) tests the sufficiency of the complaint.
Procedure
Presley v.
City of Charlottesville, 464 F.3d 480, 483 (4th Cir. 2006).
A
complaint need only satisfy the standard of Rule 8(a), which
requires a “short and plain statement of the claim showing that
the
pleader
is
entitled
to
relief.”
Fed.R.Civ.P.
8(a)(2).
counterclaim as raising a single count of abuse of process under
Maryland law.
7
“Rule 8(a)(2) still requires a ‘showing,’ rather than a blanket
assertion,
of
entitlement
to
relief.”
Bell
Twombly, 550 U.S. 544, 555 n. 3 (2007).
Atl.
Corp.
v.
That showing must
consist of more than “a formulaic recitation of the elements of
a cause of action” or “naked assertion [s] devoid of further
factual enhancement.”
Ashcroft v. Iqbal, 556 U.S. 662, 678
(2009) (internal citations omitted).
At this stage, the court must consider all well-pleaded
allegations in a complaint as true, Albright v. Oliver, 510 U.S.
266, 268 (1994), and must construe all factual allegations in
the
light
most
favorable
to
the
plaintiff,
see
Harrison
v.
Westinghouse Savannah River Co., 176 F.3d 776, 783 (4th Cir.
1999) (citing Mylan Labs., Inc. v. Matkari, 7 F.3d 1130, 1134
(4th
Cir.
1993)).
The
court
unsupported legal allegations.
need
not,
however,
accept
Revene v. Charles Cnty. Comm’rs,
882 F.2d 870, 873 (4th Cir. 1979).
Nor must it agree with legal
conclusions couched as factual allegations, Iqbal, 556 U.S. at
678, or conclusory factual allegations devoid of any reference
to actual events, United Black Firefighters v. Hirst, 604 F.2d
844, 847 (4th Cir. 1979); see also Francis v. Giacomelli, 588
F.3d 186, 193 (4th Cir. 2009).
“[W]here the well-pleaded facts
do not permit the court to infer more than the mere possibility
of
misconduct,
the
complaint
has
alleged,
but
it
‘show[n] . . . that the pleader is entitled to relief.’”
8
has
not
Iqbal,
556
U.S.
at
679
(quoting
Fed.R.Civ.P.
8(a)(2)).
Thus,
“[d]etermining whether a complaint states a plausible claim for
relief will . . . be a context-specific task that requires the
reviewing court to draw on its judicial experience and common
sense.”
B.
Id.
Analysis
Under Maryland law, an action for abuse of process provides
a remedy “for those cases ‘in which legal procedure has been set
in motion in proper form, with probable cause, and even with
ultimate
success,
but
nevertheless
has
been
perverted
to
accomplish an ulterior purpose for which it was not designed.’”
One Thousand Fleet Limited Partnership v. Guerriero, 346 Md. 29,
38 (1997) (quoting W. Keeton, Prosser & Keeton on the Law of
Torts § 121, at 897 (5th ed. 1984)).
To state a claim for abuse
of civil process, the plaintiff must set forth facts which, if
proven, would establish:
[F]irst, that the defendant willfully used
process after it has issued in a manner not
contemplated by law, Keys [v. Chrysler
Credit Corp., 303 Md. 397, 411 (1985)];
second, that the defendant acted to satisfy
an ulterior motive; and third, that damages
resulted from the defendant’s perverted use
of process, Berman [v. Karvounis, 308 Md.
259, 262 (1987)].
Id.3
3
As will be explained, a claim for abuse
process does not require a showing of damages.
9
of
criminal
The key distinction between abuse of process, on the one
hand, and malicious use of process and/or malicious prosecution,
on the other, is that “the gist of the tort is not commencing an
action or causing process to issue without justification, but
misusing, or misapplying process justified in itself for an end
other than that which it was designed to accomplish.”
Wood v.
Palmer Ford, Inc., 47 Md.App. 692, 705 (1981) (quoting Prosser,
Law of Torts 856 (4th ed. 1971)).
“[T]here is, in other words, a
form of extortion, and it is what is done in the course of
negotiation, rather than the issuance or any formal use of the
process itself, which constitutes the tort.”
Palmer Ford, Inc.
v. Wood, 298 Md. 484, 512 (1984) (quoting Prosser, supra, at
857).
If a party invoking civil or criminal process is “content
to use the particular machinery of the law for the immediate
purpose for which it was intended, he is not ordinarily liable,
notwithstanding a vicious or vindictive motive.”
Id.
“But the
moment he attempts to attain some collateral objective, outside
the scope of the operation of the process employed, a tort has
been consummated.”
The
Id. at 512-13.
proper
analysis
of
an
abuse
of
process
claim,
therefore, involves a comparison between the lawful purpose for
which the process in question was intended and the improper
purpose
for
which
purpose
usually
it
takes
was
the
actually
form
10
employed.
of
coercion
“The
to
improper
obtain
a
collateral advantage, not properly involved in the proceeding
itself, such as the surrender of property or the payment of
money, by the use of the process as a threat or club.”
Wood, 47
Md.App. at 706-07 (quoting Prosser, supra, at 857).
Thus, in
Zablonsky v. Perkins, 230 Md. 365, 370 (1963), the Court of
Appeals
of
Maryland
liability
for
attempted
to
affirmed
abuse
use
of
the
collection agency.”
the
process
State’s
trial
where
criminal
court’s
“the
finding
defendant
process
as
a
.
of
.
.
private
Similarly, in Palmer Ford, 298 Md. at 511,
a viable abuse of process claim was based on evidence showing
that “it was the purpose of Palmer Ford . . . to use [] criminal
proceedings to effect collection of the amount claimed from Wood
for
repairs
involves
the
to
his
abuse
car.”
of
While
criminal
the
tort
process,
most
frequently
liability
premised on the misuse of civil process as well.
may
be
“A cause of
action for civil abuse of process,” however, “requires that the
plaintiff establish that an arrest of the person or a seizure of
property of the plaintiff resulted from the abuse of process.”
One
Thousand
Fleet,
346
Md.
at
45
(citing
Bartlett
v.
Christhilf, 69 Md. 219, 231 (1888)); see also Krashes v. White,
275 Md. 549, 555 (1975) (“Unlike a plaintiff in a malicious use
of civil process suit, the plaintiff in a criminal malicious
prosecution action need not prove any special damages, such as
arrest or seizure of property.”).
11
Given these parameters, Defendant’s abuse of process claim
cannot be sustained.
Initially, insofar as Defendant complains
about the untoward purposes and methods employed by Plaintiff in
bringing this suit, his counterclaim sounds as one for malicious
use of process, rather than abuse of process.
As the court
explained in One Thousand Fleet, 346 Md. at 39-40:
The case of Keys v. Chrysler Credit
Corporation, 303 Md. 397, 494 A.2d 200
(1985), illustrates the differences between
malicious use of process and abuse of
process.
In Keys, Anna Keys’s wages were
attached by a writ of garnishment issued to
enforce a judgment that Keys had fully
satisfied more than four years earlier. Id.
at 400, 494 A.2d at 201. . . . Keys sued
Chrysler Credit for, inter alia, malicious
use of process and abuse of process. Id. at
402, 494 A.2d at 202.
Judge McAuliffe,
writing for the Court, concluded that the
trial court improperly dismissed Keys’s
malicious use of process claim because a
prior civil proceeding had been instituted
by Chrysler Credit against Keys, that the
proceeding was instituted without probable
cause inasmuch as Chrysler admitted that
Keys had fully paid the judgment, that
malice may be inferred from a want of
probable cause, that the proceeding was
terminated in Keys’s favor, and that Keys
suffered a seizure of her property, i.e.,
the garnished wages.
Id. at 408-10, 494
A.2d at 205-07.
The Court held, however,
that Keys could not maintain an action for
abuse of process because there was no
evidence of any improper use or perversion
of the process after it issued.
The Court
noted that Keys’s “proper complaint in this
case is with the issuance of the process, .
. . and she has no proper proof of an abuse
of process.”
Id. at 412, 494 A.2d at 207
12
(emphasis added). Thus, an action for abuse
of process could not survive.
(Emphasis
and
second
Defendant
alleges
complaint
“used
alteration
that
to
the
“key
convince
in
original).
allegations”
the
[c]ourt
to
As
of
noted,
Plaintiff’s
authorize
the
issuance of the subpoena were false” and designed to “mis[lead]
the [c]ourt in order to further [Plaintiff’s] scheme.”
23 ¶ 41).
(ECF No.
An abuse of process claim does not concern whether a
complaint was brought, or any court process was issued, in good
faith or based on sufficient cause.
Allegations such as these
could only be actionable as malicious use of process, which
requires, inter alia, that the prior proceeding was “terminated
in favor of the plaintiff.”
Because
the
instant
case
One Thousand Fleet, 346 Md. at 37.4
has
not
terminated,
much
less
terminated in favor of Defendant, such a claim could not be
viable here.
The
only
facts
set
forth
by
Defendant
that
could
potentially support an abuse of process claim relate to the
4
Under Maryland law, a cause of action for malicious use of
process has five elements: (1) a prior civil proceeding was
instituted by the defendant; (2) that proceeding was instituted
without probable cause (i.e., “a reasonable ground for belief in
the existence of such state of facts as would warrant
institution of the suit or proceeding complained of”); (3) the
prior proceeding was instituted by the defendant with malice
(i.e., “the party instituting proceedings was actuated by an
improper motive”); (4) the proceedings terminated in favor of
the plaintiff; and (5) a “special injury” resulted that “would
not necessarily result in all suits prosecuted to recover for a
like cause of action.” One Thousand Fleet, 346 Md. at 37.
13
issuance of the subpoena to Defendant’s ISP and the ensuing
settlement letter transmitted by Plaintiff.
The lawful purpose
of the subpoena was to compel the ISP to divulge Defendant’s
name and address, which, in turn, would enable Plaintiff to file
an amended complaint naming the proper defendants and requesting
the issuance of summonses.
While the fact that Plaintiff also
used that information to convey a settlement offer is clearly
“outside
the
scope”
of
the
subpoena,
the
purpose
of
the
settlement letter was not “to attain some collateral objective.”
Palmer Ford, 298 Md. at 512-13.
the suit.
shakedown
would
The only threat contained in Plaintiff’s “extortive
letter,”
“formally
declined
Indeed, it proposed to resolve
to
as
name
Defendant
[Mr.
settle.
calls
Steinruck]
(ECF
No.
it,
as
a
23-3).
is
that
Plaintiff
defendant”
if
Insofar
as
he
this
constitutes a “threat,” it is no different from those routinely
presented in demand letters to potential defendants prior to the
filing of law suits in court.
While it is likely true, given
the salacious nature of the film, that Plaintiff had substantial
leverage in settlement discussions, there is nothing wrong with
presenting
a
defendant
with
a
settlement
offer
prior
to
proceeding with litigation, and the fact that Plaintiff may have
had
an
ulterior
process analysis.
motive
is
inconsequential
in
the
abuse
of
See Wallace v. Mercantile County Bank, 514
F.Supp.2d 776, 793 (D.Md. 2007) (“[n]o liability is incurred
14
where
the
defendant
has
done
nothing
more
than
pursue
the
lawsuit to its authorized conclusion regardless of how evil his
motive
may
be”)
(quoting
(internal marks omitted)).
One
Thousand
Fleet,
346
Md.
at
38
Moreover, Defendant has not suffered
an “arrest or a seizure of property,” as required to establish a
claim
of
abuse
of
civil
process
Thousand Fleet, 346 Md. at 48.
under
Maryland
law.
One
To the extent that he has
suffered reputational harm from the association of his name with
the unauthorized downloading and/or uploading of pornography,
his injury was self-inflicted.
A procedure was put in place by
which Defendant could have vindicated his vehement denials of
liability without publicly revealing his identity.
He elected
to reveal his name, however, and he cannot now reasonably assert
that
damages
attributable
to
this
revelation
were
caused
by
Plaintiff.
In sum, the facts presented in the counterclaim do not
support a cause of action for abuse of process.
Accordingly,
Plaintiff’s motion to dismiss will be granted.
III. Motion for Sanctions
Observing
advanced
that
virtually
Defendant’s
identical
counsel
counterclaims
has
in
unsuccessfully
other
courts,
Plaintiff alleges that the instant counterclaim is frivolous and
that attorneys’ fees and costs associated with litigating the
motion to dismiss should be awarded pursuant to 28 U.S.C. §
15
1927.
Section 1927 provides that “[a]ny attorney . . . who so
multiplies
the
proceedings
in
any
case
unreasonably
and
vexatiously may be required by the court to satisfy personally
the
excess
incurred
costs,
because
expenses,
of
such
and
attorneys’
conduct.”
fees
“Courts
reasonably
have
imposed
sanctions under this section only when there is a clear showing
of bad faith: ‘when the attorney’s actions are so completely
without merit as to require the conclusion that they must have
been taken for some improper purpose such as delay.’”
Dobkin v.
Johns Hopkins University, Civ. No. HAR 93-2228, 1995 WL 167802,
at *2 (D.Md. Mar. 24, 1995) (citing Oliveri v. Thompson, 803
F.2d 1265, 1273 (2nd Cir. 1986)).
The instant record does not reflect that Defendant filed
his counterclaim in bad faith.
motives
of
documented,
certain
plaintiffs
and
in
several
circumstances,
suits
courts
an
Issues with the methods and
of
this
have
actionable
nature
suggested
claim
could
are
well-
that,
under
be
viable.
See, e.g., Third Degree Films v. Does 1-47, --- F.R.D. ----,
2012 WL 4498911, at *1 (D.Mass. Oct. 2, 2012) (“it appears that
in at least some of these cases, adult film companies may be
misusing
the
subpoena
powers
of
the
court,
seeking
the
identities of the Doe defendants solely to facilitate demand
letters
and
coerce
settlement,
rather
than
ultimately
serve
process and litigate the claims”); Raw Films, Ltd. v. Does 1-32,
16
No. 3:11cv532-JAG, 2011 WL 6182025, at *2 (E.D.Va. Oct. 5, 2011)
(“The plaintiffs seemingly have no interest in litigating the
cases, but rather simply have used the Court and its subpoena
powers to obtain sufficient information to shake down the John
Does”).
The fact that some courts have dismissed counterclaims
does not necessarily mean that similar claims presented in other
cases are frivolous.5
1927
aims
only
at
In any event, “[t]he unambiguous text of §
attorneys
who
multiply
proceedings”;
this
provision “focuses on the conduct of the litigation and not on
its merits.”
1999)
DeBauche v. Trani, 191 F.3d 499, 511 (4th Cir.
(emphasis
finding
that
proceedings.
in
original).
defense
Here,
counsel
there
unreasonably
is
no
basis
multiplied
for
the
Accordingly, Plaintiff’s motion for sanctions will
be denied.
5
Plaintiff attaches to its motion the transcript of a
proceeding in the United States District Court for the District
of Columbia in which an abuse of process counterclaim raised by
Defendant’s counsel was dismissed.
(ECF No. 29-3).
According
to Plaintiff, the transcript “speaks for itself” with regard to
that court’s finding that the claim was frivolous. (ECF No. 291, at 6).
To the contrary, the transcript reveals that the
court simply found that the facts presented did not support
liability in that case.
While the court later found that
counsel offered a “frivolous excuse” with respect to a different
motion (id. at 11), he made no such finding with regard to the
defendant’s counterclaim.
Indeed, the plaintiff’s motion for
sanctions related to that filing was denied.
17
IV.
Conclusion
For the foregoing reasons, Plaintiff’s motion to dismiss
counterclaim will be granted and its motion for sanctions will
be denied.
A separate order will follow.
________/s/_________________
DEBORAH K. CHASANOW
United States District Judge
18
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?